A Novel Equivalent Model of Active Distribution Networks Based on LSTM
نویسندگان
چکیده
منابع مشابه
mortality forecasting based on lee-carter model
over the past decades a number of approaches have been applied for forecasting mortality. in 1992, a new method for long-run forecast of the level and age pattern of mortality was published by lee and carter. this method was welcomed by many authors so it was extended through a wider class of generalized, parametric and nonlinear model. this model represents one of the most influential recent d...
15 صفحه اولActive Distribution Networks Restoration after Extreme Events
After extreme events such as floods, thunderstorms, blizzards and hurricanes there will be devastating effects in the distribution networks which may cause a partial or complete blackout. Then, the major concern for the system operators is to restore the maximum critical loads as soon as possible by available generation units. In order to solve this problem, this paper provides a restoration s...
متن کاملa study on insurer solvency by panel data model: the case of iranian insurance market
the aim of this thesis is an approach for assessing insurer’s solvency for iranian insurance companies. we use of economic data with both time series and cross-sectional variation, thus by using the panel data model will survey the insurer solvency.
A Review on Energy Storage Systems Planning in Active Distribution Networks and its Applications
With the restructuring of power systems, increase of renewable energy sources, and as networks become smarter, power systems are facing new challenges such as uncertainty in available energy resources. An appropriate solution to address these challenges are to use energy storage systems. Therefore, sizing, location, and selection of energy storage systems are important to maximize their benefit...
متن کاملDetecting Active Bot Networks Based on DNS Traffic Analysis
Abstract—One of the serious threats to cyberspace is the Bot networks or Botnets. Bots are malicious software that acts as a network and allows hackers to remotely manage and control infected computer victims. Given the fact that DNS is one of the most common protocols in the network and is essential for the proper functioning of the network, it is very useful for monitoring, detecting and redu...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Neural Networks and Learning Systems
سال: 2019
ISSN: 2162-237X,2162-2388
DOI: 10.1109/tnnls.2018.2885219